http://bugzilla.kernel.org/show_bug.cgi?id=12758
------- Comment #2 from len.br...@intel.com 2009-02-25 15:03 ------- Created an attachment (id=20368) --> (http://bugzilla.kernel.org/attachment.cgi?id=20368&action=view) revert offending patch from 2.6.29-rc6 Thanks for the acpidump. The DSDT does indeed defines an opregion covering the ELCR: OperationRegion (ELCR, SystemIO, 0x04D0, 0x02) Field (ELCR, ByteAcc, NoLock, Preserve) { ELC1, 8, ELC2, 8 } However, no AML in the system actually references this opregion, so the Linux warning is a false positive. Bob Moore pointed out that if we checked our illegal IO port address list at run-time rather than init-time, then we'd not have any warnings on this box; and he volunteered to put that check into upstream ACPICA. So I'll delete the init-time check from Linux (we've lived without it from pre-history until 2.6.29-rc) and we'll test the run-time ACPICA address validation when it becomes available. -- Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is. ------------------------------------------------------------------------------ Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA -OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise -Strategies to boost innovation and cut costs with open source participation -Receive a $600 discount off the registration fee with the source code: SFAD http://p.sf.net/sfu/XcvMzF8H _______________________________________________ acpi-bugzilla mailing list acpi-bugzilla@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/acpi-bugzilla